[pkg-go] Bug#1117966: Fwd: Bug#1117966: podman: CVE-2025-4953

Chris Evich cevich at redhat.com
Tue Dec 9 21:05:10 GMT 2025


Hi,

Yes, it's fine by me.  I don't remember what's in the google doc 
anymore, but I'll attach a copy of what we have in our CI systems.  I 
added a license and altered the accessory container image FQINs to 
generic ones. Since this script normally runs behind a proxy.  I tested 
it on RHEL 9.4 and it seems to work as intended.

---
Chris Evich (he/him)
Senior Software Maintenance Engineer
If there's a "hard-way", I'm the first one to implement it :D

On 12/8/25 3:47 PM, Tom Sweeney wrote:
> Reinhard, I'm fine with attaching the bash script publicly, however, I'd 
> like to get a head nod from Chris Evich, who created that script.  I 
> don't believe he will have an issue, but just to be safe.
> 
> Chris?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: is_vulnerable_CVE-2025-4953.sh
Type: application/x-shellscript
Size: 6190 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-go-maintainers/attachments/20251209/7add2663/attachment.bin>


More information about the Pkg-go-maintainers mailing list